ARTICLES

Why IoT Malware Grew Three-Fold this Year

Businesses are increasingly adopting connected technologies and as a result IoT malware is increasingly intruding its way into the world... Businesses are increasingly adopting connected...

How Predictive Analytics Enhances Cyber Security

Not many are aware that predictive analysis combined with AI and ML have a key role in cyber security to identify potential cyberthreats in...

Why Email Impersonation Attacks are Deadly

The rise in email impersonation attacks is a reminder that organizations should re-assess their security process. Read on to know more about the email...

How an Australian Boy Hacked into Apple Network

Apple's internal systems were breached by an Australian teenager. Read on to know how Apple tipped FBI which ultimately led to his arrest... The Australian...

NEWS

Embrace RPKI to Secure BGP Routing, Cloudflare Says

Source: SW | By Ionut Arghire BGP (Border Gateway Protocol) routing isn’t secure and organizations should embrace Resource Public Key Infrastructure (RPKI) to improve security,...

AdGuard was hit by brute-force attack

Source: CW | By Sophia Brown AdGuard was hit by brute-force attack and is now resetting every user’s password • The company detected continuous login attempts...

Chinese-speaking cybercrime group launches destructive malware family

Source: CS | By Patrick Howell O'Neill A prolific cybercrime group known as Iron Group is actively developing a new family of destructive malware that...

wolfSSL Announces the First Commercial Release of TLS 1.3

wolfSSL, a tech provider of TLS cryptography announces the world’s first commercial release of TLS 1.3. With the imminent finalization of the TLS 1.3...

INTERVIEWS

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...